Filtered by vendor Novell
Subscribe
Total
670 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2006-4509 | 1 Novell | 1 Edirectory | 2017-07-19 | 10.0 HIGH | N/A |
Integer overflow in the evtFilteredMonitorEventsRequest function in the LDAP service in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted request. | |||||
CVE-2006-4517 | 1 Novell | 1 Imanager | 2017-07-19 | 7.8 HIGH | N/A |
Novell iManager 2.5 and 2.0.2 allows remote attackers to cause a denial of service (crash) in the Tomcat server via a long TREE parameter in an HTTP POST, which triggers a NULL pointer dereference. | |||||
CVE-2006-4177 | 1 Novell | 1 Edirectory | 2017-07-19 | 7.5 HIGH | N/A |
Heap-based buffer overflow in the NCP engine in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted NCP over IP packet that causes NCP to read more data than intended. | |||||
CVE-2006-2185 | 1 Novell | 1 Netware | 2017-07-19 | 4.0 MEDIUM | N/A |
PORTAL.NLM in Novell Netware 6.5 SP5 writes the username and password in cleartext to the abend.log log file when the groupOperationsMethod function fails, which allows context-dependent attackers to gain privileges. | |||||
CVE-2006-1322 | 1 Novell | 2 Netware, Netware Ftp Server | 2017-07-19 | 5.0 MEDIUM | N/A |
Novell Netware NWFTPD 5.06.05 allows remote attackers to cause a denial of service (ABEND) via an MDTM command that uses a long path for the target file, possibly due to a buffer overflow. | |||||
CVE-2005-3314 | 1 Novell | 1 Netmail | 2017-07-10 | 7.5 HIGH | N/A |
Stack-based buffer overflow in the IMAP daemon in Novell Netmail 3.5.2 allows remote attackers to execute arbitrary code via "long verb arguments." | |||||
CVE-2005-2804 | 1 Novell | 1 Groupwise | 2017-07-10 | 5.0 MEDIUM | N/A |
Integer overflow in the registry parsing code in GroupWise 6.5.3, and possibly earlier version, allows remote attackers to cause a denial of service (application crash) via a large TCP/IP port in the Windows registry key. | |||||
CVE-2005-3655 | 1 Novell | 1 Open Enterprise Server | 2017-07-10 | 7.5 HIGH | N/A |
Heap-based buffer overflow in Novell Open Enterprise Server Remote Manager (novell-nrm) in Novell SUSE Linux Enterprise Server 9 allows remote attackers to execute arbitrary code via an HTTP POST request with a negative Content-Length parameter. | |||||
CVE-2005-2620 | 1 Novell | 1 Groupwise | 2017-07-10 | 5.0 MEDIUM | N/A |
grpWise.exe for Novell GroupWise client 5.5 through 6.5.2 stores the password in plaintext in memory, which allows attackers to obtain the password using a debugger or another mechanism to read process memory. | |||||
CVE-2005-0744 | 1 Novell | 1 Ichain | 2017-07-10 | 10.0 HIGH | N/A |
The web GUI for Novell iChain 2.2 and 2.3 SP2 and SP3 allows attackers to hijack sessions and gain administrator privileges by (1) sniffing the connection on TCP port 51100 and replaying the authentication information or (2) obtaining and replaying the PCZQX02 authentication cookie from the browser. | |||||
CVE-2004-2579 | 1 Novell | 1 Ichain | 2017-07-10 | 7.5 HIGH | N/A |
ACLCHECK module in Novell iChain 2.3 allows attackers to bypass access control rules of an unspecified component via an unspecified attack vector involving a string that contains escape sequences represented with "overlong UTF-8 encoding." | |||||
CVE-2004-2580 | 1 Novell | 1 Ichain | 2017-07-10 | 5.8 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Novell iChain 2.3 allows remote attackers to obtain login credentials via unspecified vectors. | |||||
CVE-2004-2581 | 1 Novell | 1 Ichain | 2017-07-10 | 5.0 MEDIUM | N/A |
Novell iChain 2.3 allows attackers to cause a denial of service via a URL with a "specific string." | |||||
CVE-2004-2582 | 1 Novell | 1 Ichain | 2017-07-10 | 5.0 MEDIUM | N/A |
Novell iChain 2.3 includes the build number in the VIA line of the proxy server's HTTP headers, which allows remote attackers to obtain sensitive information. | |||||
CVE-2004-2554 | 1 Novell | 1 Client Firewall | 2017-07-10 | 7.2 HIGH | N/A |
Novell Client Firewall (NCF) 2.0, as based on the Agnitum Outpost Firewall, allows local users to execute arbitrary code with SYSTEM privileges by opening the NCF tray icon and using the Help functionality to launch programs with SYSTEM privileges. | |||||
CVE-2005-2276 | 1 Novell | 1 Groupwise Webaccess | 2017-07-10 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Novell Groupwise WebAccess 6.5 before July 11, 2005 allows remote attackers to inject arbitrary web script or HTML via an e-mail message with an encoded javascript URI (e.g. "jAvascript" in an IMG tag. | |||||
CVE-2005-2469 | 1 Novell | 1 Netmail | 2017-07-10 | 4.6 MEDIUM | N/A |
Stack-based buffer overflow in the NMAP Agent for Novell NetMail 3.52C and possibly earlier versions allows local users to execute arbitrary code via a long user name in the USER command. | |||||
CVE-2005-1060 | 1 Novell | 1 Netware | 2017-07-10 | 5.0 MEDIUM | N/A |
Unknown vulnerability in the TCP/IP functionality (TCPIP.NLM) in Novell Netware 6.x allows remote attackers to cause a denial of service (ABEND by Page Fault Processor Exception) via certain packets. | |||||
CVE-2005-1543 | 1 Novell | 5 Zenworks, Zenworks Desktops, Zenworks Remote Management and 2 more | 2017-07-10 | 7.5 HIGH | N/A |
Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests. | |||||
CVE-2005-0296 | 1 Novell | 2 Groupwise, Groupwise Webaccess | 2017-07-10 | 5.0 MEDIUM | N/A |
** DISPUTED ** NOTE: this issue has been disputed by the vendor. The error module in Novell GroupWise WebAccess allows remote attackers who have not authenticated to read potentially sensitive information, such as the version, via an incorrect login and a modified (1) error or (2) modify parameter that returns template files or the "about" information page. NOTE: the vendor has disputed this issue. |